Web Hosting Knowledge Base Web Hosting Knowledge Base
  • Home
Get Started
Web Hosting Knowledge Base Web Hosting Knowledge Base
Get Started
Web Hosting Knowledge Base Web Hosting Knowledge Base
  • Home
loading
  1. Home
  2. Security
  3. How to create a strong password
Updated on June 22, 2024

Security

  • Folder icon closed Folder open iconWhat is KernelCare?
  • Folder icon closed Folder open iconHow to help prevent spam in cPanel
  • Folder icon closed Folder open iconHow To Prevent Outgoing Email From Being Marked As Spam
  • Folder icon closed Folder open iconHow To Secure Your WordPress Site
  • Folder icon closed Folder open iconAn introduction to SSL
  • Folder icon closed Folder open iconHow to install a third-party SSL certificate
  • Folder icon closed Folder open iconHow to install an Organization Verified SSL certificate
  • Folder icon closed Folder open iconHow to install a Domain Verified SSL certificate
  • Folder icon closed Folder open iconHow to renew an SSL certificate
  • Folder icon closed Folder open iconHow to redirect visitors to SSL connections
  • Folder icon closed Folder open iconHow to use www and non-www domains with an SSL certificate
  • Folder icon closed Folder open iconHow To Find SSL Certificate Fingerprints
  • Folder icon closed Folder open iconHow to generate a private key and CSR from the command line
  • Folder icon closed Folder open iconHow to fix mixing of secure and insecure content on a web page
  • Folder icon closed Folder open iconHow to install an SSL certificate site seal
  • Folder icon closed Folder open iconSSL certificates and Server Name Indication (SNI) support
  • Folder icon closed Folder open iconHow to determine the OpenSSL version
  • Folder icon closed Folder open iconHow to secure an unmanaged server with a Let's Encrypt SSL certificate
  • Folder icon closed Folder open iconDifferences between Let's Encrypt certificates and traditional CA-issued certificates
  • Folder icon closed Folder open iconHow to manage HTTP Strict Transport Security (HSTS) for your site
  • Folder icon closed Folder open iconHow to install a self-signed SSL certificate
  • Folder icon closed Folder open iconDifferences between a cPanel certificate and a traditional CA-issued certificate
  • Folder icon closed Folder open iconWhere are SSL certificates from DigiCert, Sectigo, and cPanel banned?
  • Folder icon closed Folder open iconWhere are Comodo SSL certificates banned?
  • Folder icon closed Folder open iconPerpetual Security information
  • Folder icon closed Folder open iconHow to secure an unmanaged server
  • Folder icon closed Folder open iconHow to repair and secure a hacked site
  • Folder icon closed Folder open iconHow to help prevent spam
  • Folder icon closed Folder open iconHow to create a strong password
  • Folder icon closed Folder open iconHow to install server updates
  • Folder icon closed Folder open iconHow to harden a server with fail2ban
  • Folder icon closed Folder open iconHow to fix the Heartbleed vulnerability on unmanaged servers
  • Folder icon closed Folder open iconUnderstanding software vulnerabilities and protecting your account
  • Folder icon closed Folder open iconHow to protect yourself from email phishing scam attempts
  • Folder icon closed Folder open iconHow to generate Google reCAPTCHA keys for site security
  • Folder icon closed Folder open iconTLS and cipher suites update for December 2019
  • Folder icon closed Folder open iconHow to request Google to review hacked sites and remove Deceptive Site Ahead’ warning
  • Folder icon closed Folder open iconWhat is email spoofing?
  • Folder icon closed Folder open iconMigrations and legacy e-mail client applications
  • Folder icon closed Folder open iconSecure Sockets Layer (SSL) information
    • SSL/TLS certificate validity periods
    • How to generate a purchased SSL certificate for an unmanaged hosting account

How to create a strong password

Estimated reading: 3 minutes 160 views

This article discusses some techniques and advice on how to create a strong password.Table of Contents

  • Choosing a strong password
  • How not to choose a strong password
  • Safeguarding your password

Choosing a strong password

Here are some techniques for creating a strong password:

  • Choose a password that is at least eight characters long, but preferably longer. The longer the password, the less susceptible it is to brute-force attacks.
  • Use a mixture of lowercase and uppercase characters, numbers, and punctuation marks.
  • Place a punctuation mark in the middle of a word (for example, vege%tarian).
  • Use some unusual way of contracting a word. You don’t have to use an apostrophe.
  • Think of an uncommon phrase, and then take the first, second or last letter of each word. You can’t always get what you want could become ycagwyw. Throw in a capital letter, a punctuation mark, and a number or two, and you might have yCag5wyw.
  • You can deliberately misspell one or more words to make the password harder to crack.
  • Combine several of the above techniques.
  • Use something that no one but you would ever think of. The best password is one that is totally random to everyone else but you. Since this is highly dependent on the individual, it is difficult to tell you how to come up with these, but use your imagination!

How not to choose a strong password

Here are some guidelines for what not to do when choosing a password. You should avoid these techniques when you create a password:

  • Using words in a dictionary.
  • Using your username or real name.
  • Using anyone else’s name.
  • Using any word in a cracking dictionary. A cracking dictionary contains lists of words that attackers use to try to crack passwords (this is also known as a dictionary attack). These lists include abbreviations, cartoons, character patterns, machine names, famous names, female names, male names, Bible citations, movies, myths, numeric patterns, short phrases, places, science fiction, Shakespeare, songs, surnames, and just about anything else you can think of.
  • Using any of the above techniques with a single character before or after it (for example, happy1).
  • Using any of the above techniques with capitalization (for example, Penguin or Walrus).
  • Using any of the above reversed (for example, reversing cat to tac), doubled (cat to catcat), or mirrored (cat to cattac).
  • Selecting a word and substituting some characters (for example, changing password into p@ssw0rd, or supersecret into sup3rs3cr3t). Attackers are well aware of these substitutions, and can crack them.
  • Using keyboard patterns (for example, qwerty or nbvcx). Cracking programs look for these types of patterns in passwords.

Safeguarding your password

You should never share your password with anyone else. You should also never write it down. The strongest password in the world doesn’t do much good if you write it down and someone else sees it, or if you share it with someone else (who shares it with someone else, and so on).

Lastly, if you receive an e-mail message from someone who claims to be an administrator, a security specialist, or some other important-sounding position who asks you to change your password, don’t do it. This is a popular scam to trick the unsuspecting.

Still stuck? How can we help?

How can we help?

Was this page helpful? Yes No

Share this Doc

How to create a strong password

Or copy link

Clipboard Icon
CONTENTS
Leaf Illustration

© 2023 All Rights Reserved by Hostvento